Sciweavers

283 search results - page 7 / 57
» Practical ID-based encryption for wireless sensor network
Sort
View
VTC
2006
IEEE
113views Communications» more  VTC 2006»
14 years 1 months ago
On the Practical Issues in Hop Count Localization of Sensors in a Multihop Network
– Simple algorithms have been developed in the area of node localization in a wireless sensor network. For these simple algorithms to work, several assumptions were made. However...
Eddie B. S. Tan, Joo Ghee Lim, Winston Khoon Guan ...
MASS
2010
156views Communications» more  MASS 2010»
13 years 5 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
VTC
2010
IEEE
177views Communications» more  VTC 2010»
13 years 6 months ago
Randomized Robot-Assisted Relocation of Sensors for Coverage Repair in Wireless Sensor Networks
—In wireless sensor networks (WSN), stochastic node dropping and unpredictable node failure greatly impair coverage, creating sensing holes, while locally redundant sensors exist...
Greg Fletcher, Xu Li, Amiya Nayak, Ivan Stojmenovi...
INFOCOM
2010
IEEE
13 years 5 months ago
Multi-Round Sensor Deployment for Guaranteed Barrier Coverage
Abstract--Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such as intrusion detection and border surveil...
Guanqun Yang, Daji Qiao
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 7 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux